<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-12143 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-12143/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 16:09:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-12143/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB Terra AC Wallbox Vulnerabilities Allow Remote Control and Firmware Alteration</title><link>https://feed.craftedsignal.io/briefs/2026-05-abb-terra-ac-wallbox-vulns/</link><pubDate>Thu, 21 May 2026 16:09:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-abb-terra-ac-wallbox-vulns/</guid><description>Multiple buffer overflow vulnerabilities in ABB Terra AC Wallbox versions &lt;=1.8.33, exploitable via Bluetooth hijacking, could allow an attacker to remotely control the device and alter its firmware.</description><content:encoded><![CDATA[<p>ABB Terra AC Wallbox versions &lt;=1.8.33 (JP) are susceptible to three buffer overflow vulnerabilities: CVE-2025-10504 (Heap-based), CVE-2025-12142 (Classic Buffer Overflow), and CVE-2025-12143 (Stack-based). Successful exploitation could lead to heap memory pollution, potentially enabling remote control of the device and unauthorized firmware modifications. While the advisory suggests Bluetooth hijacking is a prerequisite for exploitation due to encryption, the impact of a successful attack on charging infrastructure warrants attention from defenders. ABB has released version 1.8.36 to address these issues and recommends that customers apply the update at earliest convenience. These vulnerabilities are especially relevant to organizations in the energy sector, where these charging stations are deployed worldwide.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to the ABB Terra AC Wallbox via Bluetooth, bypassing encryption (e.g., through brute-force or vulnerability in the Bluetooth stack).</li>
<li>Attacker develops a custom application designed to communicate with the charging station using a self-defined protocol.</li>
<li>Attacker crafts a malicious message with an unexpected field length, specifically targeting the memory handling routines.</li>
<li>The crafted message triggers a heap-based buffer overflow (CVE-2025-10504), polluting the heap memory.</li>
<li>The memory corruption allows the attacker to overwrite critical data structures in memory.</li>
<li>The attacker leverages the corrupted memory to gain control of the device&rsquo;s execution flow.</li>
<li>The attacker performs a write operation to the flash memory, altering the device&rsquo;s firmware.</li>
<li>The compromised firmware enables the attacker to remotely control the charging station, potentially disrupting service or causing damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to remotely control ABB Terra AC Wallbox devices. This could lead to disruption of electric vehicle charging services, potentially impacting transportation and energy infrastructure. Altering the firmware could introduce malicious functionality, such as denial-of-service attacks or unauthorized access to the power grid. The vulnerabilities affect installations worldwide, with the most immediate concern being in the energy sector. While the advisory acknowledges the need to hijack Bluetooth first, the ability to overwrite firmware has significant implications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided patch (Terra AC wallbox (JP) 1.8.36) to remediate CVE-2025-10504, CVE-2025-12142, and CVE-2025-12143 on affected ABB Terra AC Wallbox devices.</li>
<li>Monitor network traffic for suspicious Bluetooth activity targeting ABB Terra AC Wallbox devices, specifically looking for unexpected data lengths in custom protocol messages (Generic Bluetooth Detection Rule).</li>
<li>Implement network segmentation to isolate control system devices like the ABB Terra AC Wallbox from the internet and other business networks, as suggested by CISA.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>buffer overflow</category><category>cve-2025-10504</category><category>cve-2025-12142</category><category>cve-2025-12143</category></item></channel></rss>